Re: Big day for IPv6 - 1% native penetration
On 21/11/2012, at 6:17 AM, Tomas Podermanski wrote: Hi, On 11/20/12 7:24 PM, Blair Trosper wrote: I've found myself becoming a snob about IPv6. I almost look down on IPv4-only networks in the same way that I won't go see a film that isn't projected on DLP unless my arm is twisted. I'm a convert, and I'm glad to see the adoption rate edging up. However, I still scratch my head on why most major US ISPs *have* robust IPv6 peering and infrastructure and are ready to go, but they have not turned it on for their fiber/cable/DSL customers for reasons that are not clear to me. Turning IPv6 on at the basic/core of the infrastructure is the easiest part of the job. However turning IPv6 for customers requires a lot of effort and compromises. Some of the reasons are described in: http://6lab.cz/article/deploying-ipv6-practical-problems-from-the-campus-perspective/ and related presentation: http://6lab.cz/wordpress/wp-content/uploads/2012/05/tnc2012_slides_TncPresentation.pdf We (Internode), an Australian ISP, have native dual-stack enabled by default (and have done for a while) for almost all new broadband services (ADSL, FTTH, etc.). Our existing customers can turn it on via an online toolbox. All the broadband CPE that we sell, support it. It's largely a non-issue for us now. Most new customers running a 'current' operating system, who buy an ADSL or FTTH service and their modem/router from us, automatically get IPv6 from day dot without even necessarily realising it. We recently passed 5% of our customer base being on IPv6: http://www.internode.on.net/news/2012/10/288.php -- Michael
Re: Big day for IPv6 - 1% native penetration
On 21/11/2012, at 3:05 AM, Patrick W. Gilmore patr...@ianai.net wrote: On Nov 20, 2012, at 08:45 , Owen DeLong o...@delong.com wrote: It is entirely possible that Google's numbers are artificially low for a number of reasons. AMS-IX publishes stats too: https://stats.ams-ix.net/sflow/ This is probably a better view of overall percentage on the Internet than a specific company's content. It shows order of 0.5%. Why do you think Google's numbers are lower than the real total? It depends on what you are trying to measure and how you are measuring it. I don't know Google's methodology, but lets say its a simple form of the experiment: When presented with a dual stack object what percentage of users prefer to retrieve that object using IPv6 as compared to IPv4? Up so a year or so ago if a browser had access to IPv6 and IPv4 it would first attempt to connect using IPv6 and if the connection failed then it timed out and then tried to use IPv4. So the experiment would be roughly commensurate with measuring working IPv6 systems on end sites connected to workin ipv6 access networks of one sort or another. More recently some browsers (Safari on Mac OSX, Chrome, Firefox with config settings enabled) have adopted a different strategy and when presented with a dual stack object some clients may end up trying the connection using IPv4 first and then fall back to IPv6 if IPv4 fails or times out. If the experiment simply counts the percent of clients who prefer to connect using IPv6 in a Dual Stack scenario, then some of these users running more recent versions of the browser will not be counted. There are ways to compensate for this, including running a series of tests, and this form of approach is described at http://labs.apnic.net/measureipv6/ I personally have no knowledge if the numbers published by Google reflect the prefers to use IPv6 in dual stack mode or is capable of using IPv6 (by virtue of being able to retrieve a IPv6 only object) These days the second number is larger than the first. Geoff
Re: NTP Issues Today
Blake Dunlap iki...@gmail.com writes: That's what happens when you just follow vendor recommendations blindly. If you do follow that on vm's (which can actually be a good practice), make sure they pull from your own time infrastructure, and not just the world at large, and that those servers behave in a sane fashion with regard to time jumps. Emphatically disagree on the pull from your own infrastructure point. You probably don't have the budget even in a big company for sufficient diversity of sources [*] for your NTP server and even if you do the NTP servers will probably be run by the same person/organization. Mills has called the latter practice out as bad in the past. As Leo pointed out, the key is having a large diverse set so that if a couple of them go nuts they can be voted off the island. If you have a requirement for super low jitter or holdover if you lose network, you're looking at on-site devices with OCXO or Rb frequency standards in them. That doesn't mean you shouldn't be talking to the rest of the world too though. What if your on-site sources go nuts? This happens periodically, say every 10 years or so, because of crappy implementations and worst-current-practices. A re-read of https://groups.google.com/forum/?fromgroups=#!search/mills$20ntp$20byzantine/comp.protocols.time.ntp/TryjqtAd1XM/R0zzzE13Tl8J may prove instructive. (reading list also includes http://www.amazon.com/dp/1439814635/ ) In my experience NTP beats out even DNS for blatantly wrong configs in the wild that nevertheless seem to work well enough that dilettante tech folks don't notice. I might have replied to this thread yesterday but I was blissfully unaware of any problems: rs@bifrost [8] % ntpq -c peers | egrep -v '(===|remote)' | wc -l 11 rs@bifrost [9] % -r [*] particularly due to shortsighted US federal government choices on LORAN, GOES, WWVB time format, etc
Re: NTP Issues Today
On Nov 19, 2012, at 6:12 PM, Scott Weeks sur...@mauigateway.com wrote: wbai...@satelliteintelligencegroup.com Or you could just concede the fact that the navy is playing with time travel again. -- To finish this thread off for the archives... Apparently something was up with the navy stuff as a post on the outages shows.
Re: NTP Issues Today
On Nov 19, 2012, at 6:12 PM, Scott Weeks sur...@mauigateway.com wrote: Lesson learned: Use more than one NTP source. The lesson is: use MORE THAN TWO diverse NTP sources. A man with two watches has no idea what the time it actually is.
Re: NTP Issues Today
On 21/11/12 12:34, Ryan Malayter wrote: On Nov 19, 2012, at 6:12 PM, Scott Weeks sur...@mauigateway.com wrote: Lesson learned: Use more than one NTP source. The lesson is: use MORE THAN TWO diverse NTP sources. A man with two watches has no idea what the time it actually is. Per David Mills, from the discussion linked upthread, this should be FOUR OR MORE... Every critical server should have at least four sources, no two from the same organization and, as much as possible, reachable only via diverse, nonintersecting paths. Four, so that the remaining three can reach consensus even if one fails. -- Neil
Re: NTP Issues Today
Guys: We were synchronized against multiple sources. Unfortunately the Navy NTP source contaminated multiple downstream sources. Unless you can trace all your sources, if these sources all have a root source you will break. Sid Rao | CTI Group | +1 (317) 262-4677 On Nov 21, 2012, at 8:01 AM, Neil Harris n...@tonal.clara.co.uk wrote: On 21/11/12 12:34, Ryan Malayter wrote: On Nov 19, 2012, at 6:12 PM, Scott Weeks sur...@mauigateway.com wrote: Lesson learned: Use more than one NTP source. The lesson is: use MORE THAN TWO diverse NTP sources. A man with two watches has no idea what the time it actually is. Per David Mills, from the discussion linked upthread, this should be FOUR OR MORE... Every critical server should have at least four sources, no two from the same organization and, as much as possible, reachable only via diverse, nonintersecting paths. Four, so that the remaining three can reach consensus even if one fails. -- Neil
RE: NTP Issues Today
-Original Message- From: Jimmy Hess [mailto:mysi...@gmail.com] Sent: Tuesday, November 20, 2012 7:50 PM To: Van Wolfe Cc: nanog@nanog.org Subject: Re: NTP Issues Today This _should_ have caused NTP to execute a panic shutdown, instead of setting the clock back 30 million seconds. -- -JH Sounds like SNTP might have been on the client. Doesn't do much if any sanity checking. Windows used to use that, was more than happy to change the time by years if bad time received. Not sure if that is still the case. Chuck
Re: NTP Issues Today
It sounds like the Navy and who ever else they partner with (NIST?) need some egress filtering on their NTP servers to catch and prevent events like this.
Re: Big day for IPv6 - 1% native penetration
Tony Hain wrote: Tomas Podermanski wrote: Hi, It seems that today is a big day for IPv6. It is the very first time when native IPv6 on google statistics (http://www.google.com/intl/en/ipv6/statistics.html) reached 1%. Some might say it is tremendous success after 16 years of deploying IPv6 :-) T. Or one could look at it as; despite 16 years of lethargy and lack of deployment by access networks, the traffic still finds a way. ;) Tony I say we better hope and pray that the network effect works as well for IPv6 as it did for IPv4. Otherwise 1% after 16 years represents nothing so much as ongoing failure. I have had approximately 0.01% interest from any user base. That would be an interesting number to watch change. Joe
Re: Big day for IPv6 - 1% native penetration
It won't. Users do not care about IPv6 or IPv4. They want a fast and reliable Internet connection. If you think you can do that with IPv4, you don't need to do anything (well, just plan for some budget for your CGNs). If not, better start deploying IPv6. .as On 21/11/2012 12:40, Joe Maimon wrote: I have had approximately 0.01% interest from any user base. That would be an interesting number to watch change.
Re: Big day for IPv6 - 1% native penetration
On 11/20/2012 1:24 PM, Blair Trosper wrote: However, I still scratch my head on why most major US ISPs *have* robust IPv6 peering and infrastructure and are ready to go, but they have not turned it on for their fiber/cable/DSL customers for reasons that are not clear to me. I keep pestering my home ISP about turning it on (since their network is now 100% DOCSIS 3), but they just seem to think I'm making up words. One can hope, though. This has partially been a vendor issue, at least for cable providers. Two of the major CMTS vendors (one starts with C, the other A) have had IPv6 related bugs in fairly recent code releases.Both of the MSOs I've worked for have had to delay IPv6 deployment while those vendors get their waterfowl properly aligned. I know we're still waiting for one vendor to get it straightened out. J
Re: NTP Issues Today
- Original Message - From: Sid Rao s...@ctigroup.com We were synchronized against multiple sources. Unfortunately the Navy NTP source contaminated multiple downstream sources. Unless you can trace all your sources, if these sources all have a root source you will break. ... against multiple [Stratum 1] sources... Baby, if you've ever wondered... whether it matters whether your sources are strat 1 or not, now you know -- since there's no real way to get provenance on down-strat time sources that I'm aware of. Does the NTP code, people who know, give any extra credence to strat-1 sources in it's byzantine code? Cheers, -- jra -- Jay R. Ashworth Baylink j...@baylink.com Designer The Things I Think RFC 2100 Ashworth Associates http://baylink.pitas.com 2000 Land Rover DII St Petersburg FL USA #natog +1 727 647 1274
Road Runner route server, AS20001 / 7843
Anyone know of a route server on either of those AS's? Attempting to troubleshoot an issue that they're blaming on a fiber cut in Texas so I have to get more useful evidence to get it escalated. Thanks, David
Re: NTP Issues Today
On Wed, Nov 21, 2012 at 10:41:01AM -0500, Jay Ashworth wrote: ... against multiple [Stratum 1] sources... Baby, if you've ever wondered... whether it matters whether your sources are strat 1 or not, now you know -- since there's no real way to get provenance on down-strat time sources that I'm aware of. Does the NTP code, people who know, give any extra credence to strat-1 sources in it's byzantine code? Not in a way that matters if one of them suddenly becomes a falseticker. If a reference clock goes insane, it's pretty easily detected provided you have at least two more servers (or even peers configured.) Stratum 1 just means it thinks it has a reference clock attached, but those clocks fail, go into holdover, what have you all the time. NTP will happily select a stratum 2 or lower clock instead provided it appears stable (low jitter, responded to our last 255 queries, and is an eligible candidate.) To get an idea what your NTP server will do, try ntpq -p: msa@paladin:/home/msa (582)$ ntpq -p remote refid st t when poll reach delay offset jitter == -nist1.symmetric .ACTS. 1 u 304 1024 3775.1403.271 0.581 +nist1-sj.ustimi .ACTS. 1 u 307 1024 3777.8435.227 0.729 +64.147.116.229 .ACTS. 1 u 414 1024 3779.4065.742 0.068 *usno.pa-x.dec.c .USNO. 1 u 540 1024 3771.3734.242 0.032 -pegasus.latt.ne 64.250.177.145 2 u 304 1024 377 61.3835.920 6.578 -pyramid.latt.ne 216.171.124.36 2 u 361 1024 3771.0764.181 0.066 This is a stratum 2 server in the public pool. It's peering with two other stratum 2 servers that I run. Those two are deselected (-). The server marked with a * is selected, and those with a + are included in a weighted averdage used to maintain the system clock. If the primary selected server does something wonky, it's going to select one of the candidates marked with a +. In this case it has enough stratum 1 servers that it's not likely to fall back to its peers, but it can do so if those servers suddenly give it a set of unexpected replies. --msa
RE: Big day for IPv6 - 1% native penetration
We have cable broadband operations using vendor M and we're a little gun-shy because that vendor has lagged the other two with IPv6 support, and when Comcast and TimeWarner began their production IPv6 rollouts on their CMTes it wasn't with vendor M. Frank -Original Message- From: Jay [mailto:tech-li...@packet-labs.net] Sent: Tuesday, November 20, 2012 10:52 PM To: nanog@nanog.org Subject: Re: Big day for IPv6 - 1% native penetration On 11/20/2012 1:24 PM, Blair Trosper wrote: However, I still scratch my head on why most major US ISPs *have* robust IPv6 peering and infrastructure and are ready to go, but they have not turned it on for their fiber/cable/DSL customers for reasons that are not clear to me. I keep pestering my home ISP about turning it on (since their network is now 100% DOCSIS 3), but they just seem to think I'm making up words. One can hope, though. This has partially been a vendor issue, at least for cable providers. Two of the major CMTS vendors (one starts with C, the other A) have had IPv6 related bugs in fairly recent code releases.Both of the MSOs I've worked for have had to delay IPv6 deployment while those vendors get their waterfowl properly aligned. I know we're still waiting for one vendor to get it straightened out. J
Re: 25Mbps vs 4 Mbps
Don't forget that in some cases, there are ISP-local cache boxes... i.e. the Youtube Servers to which you refer may live _at_ the ISP. On Mon, Nov 19, 2012 at 7:19 AM, Nick Olsen n...@flhsi.com wrote: It's all about if the bandwidth is there to use. I'm sure every youtube caching server has a connection which exceeds 4Mb/s. How does a faster connection help? It allows the video to fill the buffer faster. Allowing for smoother playback on less bandwidth consistent circuits. Do you need it really if your video source is under 4Mb/s? In a perfect scenario, No. Now, That's youtube. Using Netflix as an example. I can start streaming a movie. And it'll pull 50-60Mb/s for about 20 seconds, And it's playing HD quality almost immediately. Where on a slower connection it may not switch to HD until its filled its buffer more. Nick Olsen Network Operations (855) FLSPEED x106 From: Glen Kent glen.k...@gmail.com Sent: Monday, November 19, 2012 10:04 AM To: nanog@nanog.org nanog@nanog.org Subject: 25Mbps vs 4 Mbps Hi, The service provider(s) pipe that takes all web traffic from my laptop to the central servers (assume youtube) remain same whether i take a 4Mbps or a 25Mbps connection from my service provider. This means that the internet connection that i take from my service provider only affects the last mile -- from my home network to my service providers first access router. Given this, would one really see a 6 times improvement in a 25Mbps connection over a 4Mbps connection? I assume that the service providers rate limit the traffic much more aggressively in a 4Mbps connection. But this would only matter if the traffic from my youtube server is greater than 4Mbps, which i suspect would be the case. The question then is that how does going for a higher BW connection from the service provider help? Glen -- Kyle Creyts Information Assurance Professional BSidesDetroit Organizer
Re: NTP Issues Today
On Nov 20, 2012, at 13:00, Darius Jahandarie djahanda...@gmail.com wrote: Hi everyone, I run the NTP Pool system - http://www.pool.ntp.org/ - so I have some opinions on some of this. :-) But beyond that, I'm honestly rather curious what server selections are a good idea. A first thought would be an adjacent country, but maybe there is a benefit to picking things outside of the pool.ntp.org selection entirely? First of all: None of the ~3800 servers in the NTP Pool system were affected by this as far as I can tell from the (copious) monitoring data. The big benefit to adding some non-pool servers is that you wouldn't be depending basically on a bunch of volunteers (and to a large extent me) for your time keeping. Though likely you'd just be depending on another group of volunteers. In addition to depending on the server operators who run the ntpd servers you also depend on: 1) The monitoring system keeping accurate time. 2) The monitoring system does its job catching bad servers. 3) The process updating and distributing the DNS data working. 4) The DNS servers working (and not being under a DoS attack or similar). 5) Anything I haven't thought of! Empirically I believe we've done a better job than just about anyone with a similar scale, but past performance is no promise of the future. I see that Jared used *.fedora.pool.ntp.org -- I wonder if there was a specific reason for that or if my questions are even worth thinking about at all :-). The servers for x.fedora.pool.ntp.org are in the same group as x.pool.ntp.org. If you are in a country with many servers in the pool then you'll very likely get different IPs for the two. If you are in a country with few servers your odds for that aren't so good and it'd be a bit pointless. Anyone using the NTP Pool in a default configuration (like Fedora does) must get a vendor zone setup - http://www.pool.ntp.org/en/vendors.html - so we have at least a little bit of a chance to monitor and mitigate problems. It also allows us to change what servers are selected, how many IPs are returned etc for a particular vendor. For example if Fedora in the future changes to use 'pool' instead of 'server' in the configuration we could optimize for that. Ask -- http://askask.com/
Re: The Verge article about Verizon's Sandy Cleanup Efforts in Manhattan
And they do have those towers all over the country... On Tue, Nov 20, 2012 at 12:47 PM, Miles Fidelman mfidel...@meetinghouse.net wrote: Christopher Morrow wrote: apologies, I forgot the emoticons after my last comment. i really did mean it in jest... I don't think VZ has harnessed weather-changing-powers. (yet). Well, they ARE The Phone Company! -- In theory, there is no difference between theory and practice. In practice, there is. Yogi Berra -- Kyle Creyts Information Assurance Professional BSidesDetroit Organizer
Recovering from spam resulting from compromised account
Hello, oh knowledgeable NANOG. I am the technical lead for network for Pixar. (Note: I am not the mail admin, he's on vacation.) Yesterday we had an account compromise that resulted in ~2.5M messages being sent through our two MTAs. I have acknowledged/closed the two SpamCop incidents, and mail is starting to flow, slowly, however we are still receiving bounces (some hard!) and I am looking for assistance in getting Pixar's IPs cleared from the blacklists. I was pointed to: http://mxtoolbox.com/SuperTool.aspx?action=blacklist%3a12.25.180.66 http://mxtoolbox.com/SuperTool.aspx?action=blacklist%3a12.25.180.94 Which shows we're still listed on Backscatterer and SPAM Cannibal. Also had reports that we're still seeing bounces to Gmail, Comcast and Yahoo accounts. What can we do to speed things along? We have a ticket open with Gmail folks since we have a studio who uses Gmail for Corporate mail. Any Comcast or Gmail SMTP contacts on NANOG that can help? Would love to get all out stuck mail out of these folks' MTAs. Or do we need to just remove ourselves from the last two blacklists at mxtoolbox? Thanks, David Sotnick -- Pixar Emeryville, CA
Re: Recovering from spam resulting from compromised account
So - 1. backscatterer and spamcannibal are obscure blocklists nobody ever uses. Spamcannibal is actually quite reasonable about removals if you declare the issue fixed 2. Gmail, comcast etc have their own blocklist removal procedures - based on you contacting their postmaster teams. postmaster.comcast.net, etc etc. 3. MXToolbox is merely a search engine for various publicly available blocklists. Gmail etc blocks wont show up there because those dont get exposed outside the provider's servers .. if you get listed on gmail you know because you see your mail bounced or bulk foldered. --srs On Thu, Nov 22, 2012 at 7:23 AM, Dave Sotnick sotnickd-na...@ddv.comwrote: Hello, oh knowledgeable NANOG. I am the technical lead for network for Pixar. (Note: I am not the mail admin, he's on vacation.) Yesterday we had an account compromise that resulted in ~2.5M messages being sent through our two MTAs. I have acknowledged/closed the two SpamCop incidents, and mail is starting to flow, slowly, however we are still receiving bounces (some hard!) and I am looking for assistance in getting Pixar's IPs cleared from the blacklists. I was pointed to: http://mxtoolbox.com/SuperTool.aspx?action=blacklist%3a12.25.180.66 http://mxtoolbox.com/SuperTool.aspx?action=blacklist%3a12.25.180.94 Which shows we're still listed on Backscatterer and SPAM Cannibal. Also had reports that we're still seeing bounces to Gmail, Comcast and Yahoo accounts. What can we do to speed things along? We have a ticket open with Gmail folks since we have a studio who uses Gmail for Corporate mail. Any Comcast or Gmail SMTP contacts on NANOG that can help? Would love to get all out stuck mail out of these folks' MTAs. Or do we need to just remove ourselves from the last two blacklists at mxtoolbox? Thanks, David Sotnick -- Pixar Emeryville, CA -- Suresh Ramasubramanian (ops.li...@gmail.com)
Re: Big day for IPv6 - 1% native penetration
On Tue, Nov 20, 2012 at 11:51:50PM -0500, Jay scribbled: # On 11/20/2012 1:24 PM, Blair Trosper wrote: # However, I still scratch my head on why most major US ISPs *have* robust # IPv6 peering and infrastructure and are ready to go, but they have not # turned it on for their fiber/cable/DSL customers for reasons that are not # clear to me. # # I keep pestering my home ISP about turning it on (since their network is # now 100% DOCSIS 3), but they just seem to think I'm making up words. One # can hope, though. # # This has partially been a vendor issue, at least for cable # providers. Two of the major CMTS vendors (one starts with C, the # other A) have had IPv6 related bugs in fairly recent code releases. # Both of the MSOs I've worked for have had to delay IPv6 deployment # while those vendors get their waterfowl properly aligned. I know # we're still waiting for one vendor to get it straightened out. I know it to be a vendor issue for GPON FTTH gear, as well. At least with one major vendor (begins with a C also). They're definitely lagging. We have an IPv6 deployment in the core natively, as well built as our IPv4 infrastructure, and yet nothing on the access side. Any quarter now, I'm still hearing. Until then, we wait, and the pool of IPv4 dwindles. -- Jonathan Towne
Re: Recovering from spam resulting from compromised account
Thanks Matthew. Sadly, most of the bounce responses have URLs that point you to a help page that doesn't have further contact information or just tells you to wait it out. e.g. http://postmaster.yahoo.com/421-ts03.html http://www.google.com/mail/help/bulk_mail.html I'll do the requisite digging and start contacting postmasters. -Dave On Wed, Nov 21, 2012 at 6:13 PM, Matthew Barr mb...@snap-interactive.com wrote: On Nov 21, 2012, at 8:53 PM, Dave Sotnick sotnickd-na...@ddv.com wrote: Also had reports that we're still seeing bounces to Gmail, Comcast and Yahoo accounts. The best thing to do is to go ahead and look at the bounce messages from the various ISP's, and see if they have any instructions or URL's to contact. If you don't have any of those messages at hand, you can see the bounce codes in the logs of your mailserver. If you don't have any useful messages in the bounce code, then you can probably look at the site for each ISP, and google their postmaster group. Matthew Matthew Barr Technical Architect Snap Interactive mb...@mbarr.net
Re: Recovering from spam resulting from compromised account
Hi Dave, Try this page, linked from the google help page you referenced: https://support.google.com/mail/bin/answer.py?hl=enanswer=81126rd=1 Hope that helps Andrew On 22.11.2012 13:29, Dave Sotnick wrote: Thanks Matthew. Sadly, most of the bounce responses have URLs that point you to a help page that doesn't have further contact information or just tells you to wait it out. e.g. http://postmaster.yahoo.com/421-ts03.html http://www.google.com/mail/help/bulk_mail.html I'll do the requisite digging and start contacting postmasters. -Dave On Wed, Nov 21, 2012 at 6:13 PM, Matthew Barr mb...@snap-interactive.com wrote: On Nov 21, 2012, at 8:53 PM, Dave Sotnick sotnickd-na...@ddv.com wrote: Also had reports that we're still seeing bounces to Gmail, Comcast and Yahoo accounts. The best thing to do is to go ahead and look at the bounce messages from the various ISP's, and see if they have any instructions or URL's to contact. If you don't have any of those messages at hand, you can see the bounce codes in the logs of your mailserver. If you don't have any useful messages in the bounce code, then you can probably look at the site for each ISP, and google their postmaster group. Matthew Matthew Barr Technical Architect Snap Interactive mb...@mbarr.net
Re: Recovering from spam resulting from compromised account
Wait it out as in - you had better examine your mail queues and purge them of any of the spam that was sent and is still queued up. It'll still take a day or two after that's done for the blocks to subside. On Thu, Nov 22, 2012 at 7:59 AM, Dave Sotnick sotnickd-na...@ddv.comwrote: Thanks Matthew. Sadly, most of the bounce responses have URLs that point you to a help page that doesn't have further contact information or just tells you to wait it out. e.g. http://postmaster.yahoo.com/421-ts03.html http://www.google.com/mail/help/bulk_mail.html I'll do the requisite digging and start contacting postmasters. -Dave On Wed, Nov 21, 2012 at 6:13 PM, Matthew Barr mb...@snap-interactive.com wrote: On Nov 21, 2012, at 8:53 PM, Dave Sotnick sotnickd-na...@ddv.com wrote: Also had reports that we're still seeing bounces to Gmail, Comcast and Yahoo accounts. The best thing to do is to go ahead and look at the bounce messages from the various ISP's, and see if they have any instructions or URL's to contact. If you don't have any of those messages at hand, you can see the bounce codes in the logs of your mailserver. If you don't have any useful messages in the bounce code, then you can probably look at the site for each ISP, and google their postmaster group. Matthew Matthew Barr Technical Architect Snap Interactive mb...@mbarr.net -- Suresh Ramasubramanian (ops.li...@gmail.com)
H3C Technical List
Hey all, Anyone know of a Mailing list like Cisco-NSP/Juniper-NSP for HP/H3C equipment? I have some questions regarding some H3C Switch spanning-tree behaviour, but I can't find anyone to ask. The couple of lists on puck have had almost no traffic for a ling time. Thanks all. * * *Skeeve Stevens, CEO - *eintellego Pty Ltd ske...@eintellego.net ; www.eintellego.net Phone: 1300 753 383; Cell +61 (0)414 753 383 ; skype://skeeve facebook.com/eintellego ; http://twitter.com/networkceoau linkedin.com/in/skeeve twitter.com/networkceoau ; blog: www.network-ceo.net The Experts Who The Experts Call Juniper - Cisco – IBM - Brocade - Cloud - Check out our Juniper promotion website for Oct/Nov! eintellego.mx Free Apple products during this promotion!!!
RE: H3C Technical List
Hello there Skeeve! I'll see if I can help you out. I work on comware (HPN/H3C) based gear quite a bit. Neil Moore -Original Message- From: Skeeve Stevens [mailto:ske...@eintellego.net] Sent: Wednesday, November 21, 2012 11:08 PM To: nanog@nanog.org Subject: H3C Technical List Hey all, Anyone know of a Mailing list like Cisco-NSP/Juniper-NSP for HP/H3C equipment? I have some questions regarding some H3C Switch spanning-tree behaviour, but I can't find anyone to ask. The couple of lists on puck have had almost no traffic for a ling time. Thanks all. * * *Skeeve Stevens, CEO - *eintellego Pty Ltd ske...@eintellego.net ; www.eintellego.net Phone: 1300 753 383; Cell +61 (0)414 753 383 ; skype://skeeve facebook.com/eintellego ; http://twitter.com/networkceoau linkedin.com/in/skeeve twitter.com/networkceoau ; blog: www.network-ceo.net The Experts Who The Experts Call Juniper - Cisco - IBM - Brocade - Cloud - Check out our Juniper promotion website for Oct/Nov! eintellego.mx Free Apple products during this promotion!!!